Flashback.C Trojan-Downloader
ars technica recently published a story about Flashback.C and a link to F-Secure to fix it.
Now I'm, panicking, as I did update Flash recently, but can't remember the look of the update screen.
It's such a common practice that Flash needs updating frequently that it didn't seem unusual. I'm really careful about this sort of thing and I only updated after ignoring a few previous notices.
The instructions on F-Secure tell you what files are created and to delete them. But the problem I had when checking is that it's not conclusive.
Example:
- The following line is inserted into "/Applications/Safari.app/Contents/Info.plist":
<key>LSEnvironment</key><dict><key>DYLD_INSERT_LIBRARIES</key>
<string>/Applications/Safari.app/Contents/Resources/%payload_filename%</string>< /dict> - The following line is inserted to "/Applications/Firefox.app/Contents/Info.plist":
<key>LSEnvironment</key><dict><key>DYLD_INSERT_LIBRARIES</key>
<string>/Applications/Firefox.app/Contents/Resources/%payload_filename%</string> </dict>
The installer then restarts running instances of Safari and Firefox in order to take the payload into effect.The installer also disables the built-in anti-malware feature in Mac OS X. It unloads the XProtectUpdater daemon, and then wipes out the following files:
- /System/Library/LaunchDaemons/com.apple.xprotectupdater.plist
- /usr/libexec/XProtectUpdater
I don't have that entry line in my plist files, but I also don't have the file /System/Library/LaunchDaemons/com.apple.xprotectupdater.plist
How can I check that the Flash update I did wasn't this trojan?
I checked the version of Flash I'm running and it is the latest (11.0.1.152), so it looks like it has been updated recently.
iMac, Mac OS X (10.6.8)